[kernel] r5061 - patch-tracking

Moritz Muehlenhoff jmm-guest at costa.debian.org
Wed Dec 21 11:42:22 UTC 2005


Author: jmm-guest
Date: Wed Dec 21 11:42:21 2005
New Revision: 5061

Added:
   patch-tracking/CVE-2005-0977
Log:
tmpfs DoS already resolved


Added: patch-tracking/CVE-2005-0977
==============================================================================
--- (empty file)
+++ patch-tracking/CVE-2005-0977	Wed Dec 21 11:42:21 2005
@@ -0,0 +1,23 @@
+Candidate: CVE-2005-0977
+References: 
+ http://www.ubuntulinux.org/support/documentation/usn/usn-103-1
+ http://linux.bkbits.net:8080/linux-2.6/cset@420551fbRlv9-QG6Gw9Lw_bKVfPSsg
+ http://lkml.org/lkml/2005/2/5/111
+ http://www.securityfocus.com/bid/12970
+Description: 
+ The shmem_nopage function in shmem.c for the tmpfs driver in Linux kernel
+ 2.6 does not properly verify the address argument, which allows local users
+ to cause a denial of service (kernel crash) via an invalid address.
+Notes: 
+Bugs: 303177
+upstream: released (2.6.11)
+linux-2.6: N/A
+2.6.8-sarge-security: N/A
+2.4.27-sarge-security: 
+2.6.8: released (2.6.8-16)
+2.4.19-woody-security: 
+2.4.18-woody-security: 
+2.4.17-woody-security: 
+2.4.16-woody-security: 
+2.4.17-woody-security-hppa: 
+2.4.17-woody-security-ia64: 



More information about the Kernel-svn-changes mailing list